Online Evasion Attacks on Recurrent Models:The Power of Hallucinating the Future

07/08/2022
by   Byunggill Joe, et al.
0

Recurrent models are frequently being used in online tasks such as autonomous driving, and a comprehensive study of their vulnerability is called for. Existing research is limited in generality only addressing application-specific vulnerability or making implausible assumptions such as the knowledge of future input. In this paper, we present a general attack framework for online tasks incorporating the unique constraints of the online setting different from offline tasks. Our framework is versatile in that it covers time-varying adversarial objectives and various optimization constraints, allowing for a comprehensive study of robustness. Using the framework, we also present a novel white-box attack called Predictive Attack that `hallucinates' the future. The attack achieves 98 percent of the performance of the ideal but infeasible clairvoyant attack on average. We validate the effectiveness of the proposed framework and attacks through various experiments.

READ FULL TEXT
research
02/10/2022

Adversarial Attack and Defense of YOLO Detectors in Autonomous Driving Scenarios

Visual detection is a key task in autonomous driving, and it serves as o...
research
09/16/2021

Targeted Attack on Deep RL-based Autonomous Driving with Learned Visual Patterns

Recent studies demonstrated the vulnerability of control policies learne...
research
08/10/2020

An Automated, End-to-End Framework for Modeling Attacks From Vulnerability Descriptions

Attack graphs are one of the main techniques used to automate the risk a...
research
03/05/2019

Online Data Poisoning Attack

We study data poisoning attacks in the online learning setting where the...
research
02/18/2023

Backdoor Attacks to Pre-trained Unified Foundation Models

The rise of pre-trained unified foundation models breaks down the barrie...
research
11/25/2020

Adversarial Evaluation of Multimodal Models under Realistic Gray Box Assumption

This work examines the vulnerability of multimodal (image + text) models...
research
11/07/2022

Physics-Constrained Backdoor Attacks on Power System Fault Localization

The advances in deep learning (DL) techniques have the potential to deli...

Please sign up or login with your details

Forgot password? Click here to reset